Results 1 - 10
of
78
Best-Effort Secure Positioning in Wireless Networks
, 2009
"... Research on secure positioning in wireless networks aims at achieving high precision and security, most often throwing expensive hardware and lengthy in-stallation procedures at the task. In this project, we’re turning things around and study localization potential using pre-deployed IEEE 802.11 acc ..."
Abstract
- Add to MetaCart
.11 access points and fingerprint localization on off-the-shelf devices. More specifically, we adapt standard fin-gerprint localization to be scalable and heuristically detect malicious access point in a distributed fash-ion, through gossip protocols. Evaluation is per-formed both on large-scale software
Lingering Issues in Distributed Scheduling
"... Recent advances have resulted in queue-based algorithms for medium access control which operate in a distributed fash-ion, and yet achieve the optimal throughput performance of centralized scheduling algorithms. However, fundamental performance bounds reveal that the “cautious ” activation rules inv ..."
Abstract
- Add to MetaCart
Recent advances have resulted in queue-based algorithms for medium access control which operate in a distributed fash-ion, and yet achieve the optimal throughput performance of centralized scheduling algorithms. However, fundamental performance bounds reveal that the “cautious ” activation rules
Embodied Evolutionary Robotics with Large Number of Robots
"... Embodied evolutionary robotics is a particular flavour of evo-lutionary robotics, where the evolutionary optimization of behaviours is achieved in an on-line and distributed fash-ion (Watson et al., 2002). The question asked in this paper is: does population size play a role in the evolution of part ..."
Abstract
- Add to MetaCart
Embodied evolutionary robotics is a particular flavour of evo-lutionary robotics, where the evolutionary optimization of behaviours is achieved in an on-line and distributed fash-ion (Watson et al., 2002). The question asked in this paper is: does population size play a role in the evolution
Using Precomputed Bloom Filters to Speed Up SPARQL Processing in the Cloud
"... Increasingly data on the Web is stored in the form of Semantic Web data. Because of today’s information overload, it becomes very important to store and query these big datasets in a scalable way and hence in a distributed fash-ion. Cloud Computing offers such a distributed environment with dynamic ..."
Abstract
- Add to MetaCart
Increasingly data on the Web is stored in the form of Semantic Web data. Because of today’s information overload, it becomes very important to store and query these big datasets in a scalable way and hence in a distributed fash-ion. Cloud Computing offers such a distributed environment with dynamic
An Overview of the DASH Intelligent Terminal Project
, 1984
"... Named DASH, for Dynamic Access to Shared Hosts, the intelligent terminal portion of the TILDE research project is exploring ways to use microprocessor·based workstations to simplify and enhance user access to a network of mainframe com-puters. Unlike projects that use workstations as stand-alone pro ..."
Abstract
- Add to MetaCart
-alone processors or projects that use a collection of workstations to solve a. single problem in a distributed fash-ion, DASH uses the workstation as a helper, or agent, to access network services and to interact on behalf of the user with programs running on one or more remote host processors. The DASH prototype
Fast Nearest Neighbor Search on Large Time-Evolving Graphs
"... Abstract. Finding the k nearest neighbors (k-nns) of a given vertex in a graph has many applications such as link prediction, keyword search, and image tagging. An established measure of vertex-proximity in graphs is the Personalized Page Rank (ppr) score based on random walk with restarts. Since pp ..."
Abstract
- Add to MetaCart
. Our key approach is to use a divide-and-conquer framework and efficiently compute answers in a distributed fash-ion. We represent a given graph as a collection of dense vertex-clusters with their inter connections. Each vertex-cluster maintains certain infor-mation related to internal random walks
Distributed Top-Down Hierarchy Construction
- In Proc. of the IEEE INFOCOM
, 1998
"... ABSTRACT: Hierarchies provide scalability in large net-works and are integral to many widely-used protocols and applications. Previous approaches to constructing hierar-chies have typically either assumed static hierarchy configu-ration, or have used bottom-up construction methods. We describe how t ..."
Abstract
-
Cited by 18 (2 self)
- Add to MetaCart
to construct hierarchies in a top-down fash-ion, and show that our method is much more efficient than bottom-up methods. We also show that top-down hierarchy construction is a better choice when administrative policy constraints are imposed on hierarchy formation. 1
Self-Similar Algorithms for Dynamic Distributed Systems∗
"... This paper proposes a methodology for designing a class of algorithms for computing functions in dynamic dis-tributed systems in which communication channels and pro-cesses may cease functioning temporarily or permanently. Communication and computing may be interrupted by an adversary or by environm ..."
Abstract
- Add to MetaCart
or by environmental factors such as noise and power loss. The set of processes may be partitioned into subsets that cannot communicate with each other; algo-rithms in which all such subsets behave in a similar fash-ion, regardless of size and identities of processes, are called self-similar algorithms. Algorithms
Distributed Wireless Control for Building Energy Management. BuildSys 2010 November 2
, 2010
"... Automated building energy management systems are es-sential to enabling the development of mass-market, low-energy buildings. In existing and future buildings, the im-pacts of occupant behaviors contribute significantly to the total energy efficiency. As building technologies and materi-als improve, ..."
Abstract
-
Cited by 10 (0 self)
- Add to MetaCart
present a prototype distributed control system for building energy management that uses wireless sensor network-class nodes. Using protocol inde-pendent multicast, sensors and controllers are allowed to ef-ficiently share information in a distributed peer-to-peer fash-ion. Our prototype system achieved
Exploiting Context in HCI Design for Mobile Systems
- in Workshop on Human Computer Interaction with Mobile Devices
, 1998
"... ion--Control) model [Coutaz, 1987]. Although the display and input hardware may be encapsulated in a single object or group of objects, its effects are felt in the architectural design of virtually every user-interface component. In a similar fashion the hardware that supplies contextual information ..."
Abstract
-
Cited by 62 (2 self)
- Add to MetaCart
ion--Control) model [Coutaz, 1987]. Although the display and input hardware may be encapsulated in a single object or group of objects, its effects are felt in the architectural design of virtually every user-interface component. In a similar fashion the hardware that supplies contextual
Results 1 - 10
of
78